Wednesday, January 9, 2019

SIMULATION OF THE COMBINED METHOD

SIMULATION OF THE COMBINED METHOD
Ilya Levin1 and Victor Yakovlev2
The Department of Information Security of Systems, State University of Telecommunication, St.Petersburg, Russia

ABSTRACT

DDoS attacks have become one of the most dangerous issues in the Internet today. Because of these attacks, legitimate users can not access the resources they need. In [1] authors proposed a combined method for tracing and blocking the sources of DDoS-attacks. The essence of the method is that each router marks the network packet that passes through it using a random hash function from the set. At the receiving side this information is stored and used to filter unwanted traffic and traceback the source of distributed attack. This article describes the simulation and its results of the combined method.

KEYWORDS

Traceback, DDoS-attacks, Attack path reconstruction






No comments:

Post a Comment

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...